Oxford Computer Group enables your business to be efficient and competitive through innovative identity management, identity-driven security, and identity governance solutions.

For over a decade, we have been harnessing the power of digital identity to protect organizations’ data, realize cloud strategies, and maintain compliance.

Combining deep understanding of business processes and wide-ranging expertise of implementing enabling technologies from Microsoft and other partners, we can make your vision a reality.

Award-winning identity solutions

We are a Microsoft Solutions Partner for Security, and have won Microsoft’s Partner of the Year Award 8 times, and been finalists 9 times. We offer high quality, creative, and efficient IT solutions.
Discover our Award-Winning Solutions Imagine the possibilities!

Case study: Saying Goodbye to ADFS and Migrating to Microsoft Entra ID for a Zero Trust, Cloud-First Future

Read about how OCG helped a large federal agency migrate from ADFS to Microsoft Entra ID to improve security and streamline authentication processes.

We continue working with Oxford Computer Group because we have a history of success. The three engagements that we’ve had have been very successful.

Dean G, Washington
More reviews
higher education identity challenges, secure collaboration, research, cross-tenant collaboration

Latest Webinar Recording

Securing Academic Partnerships: Overcoming Identity Challenges in Collaborative Higher Education Environments

Collaboration is at the heart of every university. How do you make sure it’s secure AND seamless?

View

Latest articles & resources See all

Latest case studies & projects See all

Webinar recordings See all webinar recordings

IDENTITY INVERSION: PUTTING MICROSOFT ENTRA ID AT THE CENTER OF IDENTITY & AUTHENTICATION

Moving the center of identity and authentication away from on-premises directories and towards a Zero Trust security model.

VIEW WEBINAR

HOW DO VERIFIABLE CREDENTIALS AND DECENTRALIZED IDENTITIES WORK?

Learn what they are, how they work, and why they’re important.

VIEW WEBINAR

Read our most popular blogs

HOW DOES CONTINUOUS ACCESS EVALUATION FIT INTO YOUR ZERO TRUST STRATEGY?

In this post-perimeter security world, how end-users authenticate to and access corporate resources should be the top priority for CISOs and security teams.

Read more

TRANSITIONING AWAY FROM MIM IN A CLOUD-FIRST WORLD

This blog series examines the options and key considerations to help MIM users to determine their path to the cloud.

Read more

As well as identity consulting we offer...

TOP TRAINING

Our specialist training team, Oxford Computer Training, offers the world’s best Azure and MIM/FIM and PAM courses.

Read more

TOOLS FOR IDENTITY PROJECTS

Simplify processes, reduce development time, and save money on your identity project with our tools for MIM and FIM.

Read more

When we say we're good, we mean it!

Award winning identity solutionsConsistently Winning
Awarded Microsoft’s Partner of the Year 8 times

Identity Masterclass with John CraddockCustomer Feedback
Don’t just take our word for it, read what our customers think

Trusted Globally
We are THE go-to company for Microsoft identity solutions